Safety vulnerability ID: 59594
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Srsly 2.4.4 includes a fix for a CVE-2022-31116.
https://github.com/explosion/srsly/commit/99106075199922cb5a70d4c273d4f75e941907a2
https://github.com/explosion/srsly/commit/febb6f2d8edab5327847e4d7eeb1c23dbde510c7
Latest version: 2.4.8
Modern high-performance serialization utilities for Python
- Port https://github.com/ultrajson/ultrajson/pull/550 and https://github.com/ultrajson/ultrajson/pull/555 to fix incorrect handling of invalid surrogate pair characters (CVE-2022-31116)
- Port https://github.com/ultrajson/ultrajson/pull/519 to fix buffer overflows ([CVE-2021-4595](https://github.com/advisories/GHSA-fh56-85cw-5pq6))
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application